Skip to content
cyrene
  • About
    • Concept
    • Work Plan
    • Impact
  • The pilots
    • CYRENE Pilot 01 – The Port trial case execution
    • CYRENE Pilot 02 – The Automotive Manufacturer trial case execution
  • The partners
  • Resources
    • Deliverables
    • Publications
    • Glossary
    • Material
  • News & Events
    • News
    • Events
    • Blog
    • Newsletter
  • CYRENE Open Call
    • CYRENE Open Call Webinar
  • Contact
Menu Close
  • About
    • Concept
    • Work Plan
    • Impact
  • The pilots
    • CYRENE Pilot 01 – The Port trial case execution
    • CYRENE Pilot 02 – The Automotive Manufacturer trial case execution
  • The partners
  • Resources
    • Deliverables
    • Publications
    • Glossary
    • Material
  • News & Events
    • News
    • Events
    • Blog
    • Newsletter
  • CYRENE Open Call
    • CYRENE Open Call Webinar
  • Contact
Read more about the article CYRENE at the Slide2Open Shipping Finance Conference 2022

CYRENE at the Slide2Open Shipping Finance Conference 2022

  • Post author:SpirosFotis
  • Post published:9 March 2022
  • Post category:News
  • Post comments:0 Comments

ZELUS presented the CYRENE project at the Slide2Open Shipping Finance Conference that took place in Athens on 2 & 3 March 2022

Continue ReadingCYRENE at the Slide2Open Shipping Finance Conference 2022
Read more about the article CYRENE at the CEN-CENELEC workshop

CYRENE at the CEN-CENELEC workshop

  • Post author:SpirosFotis
  • Post published:3 March 2022
  • Post category:News
  • Post comments:0 Comments

The CEN-CENELEC Sector Forum on Security organised a webinar to discuss the role of standards in the implementation of the Action Plan on synergies between civil, defense and space industries.

Continue ReadingCYRENE at the CEN-CENELEC workshop
Read more about the article Effective Visualization of Cyber Threats in Supply Chains

Effective Visualization of Cyber Threats in Supply Chains

  • Post author:SpirosFotis
  • Post published:25 February 2022
  • Post category:Blog

Effective visualization of cyber threats and cyber attacks can be of great assistance to empowering the cybersecurity protocols of supply chains and supply chain services.

Continue ReadingEffective Visualization of Cyber Threats in Supply Chains
Read more about the article Supply Chain Vulnerability Assessment

Supply Chain Vulnerability Assessment

  • Post author:SpirosFotis
  • Post published:23 February 2022
  • Post category:Blog

Safeguarding the cybersecurity of supply chains (SCs) is an ever evolving and continuous challenge. In CYRENE project, we aim to tackle certain cybersecurity aspects related to the SCs. One of those aspects relates to the supply chain vulnerability assessment.

Continue ReadingSupply Chain Vulnerability Assessment
Read more about the article CYRENE’s 5th plenary meeting

CYRENE’s 5th plenary meeting

  • Post author:SpirosFotis
  • Post published:11 February 2022
  • Post category:Events
  • Post comments:0 Comments

The consortium members of CYRENE gathered for their 5th plenary meeting on Tuesday the 8th and Wednesday the 9th of February 2022.

Continue ReadingCYRENE’s 5th plenary meeting
Read more about the article KCYEU 2022 Workshop – Call For Papers

KCYEU 2022 Workshop – Call For Papers

  • Post author:SpirosFotis
  • Post published:24 January 2022
  • Post category:Events

Call for Papers and Work-in-Progress Presentations for the workshop “Key challenges in global cybersecurity: Efforts and trends in EU” (KCYEU-2022). The workshop is organized by the H2020 projects FISHY, CYRENE and IoTAC.

Continue ReadingKCYEU 2022 Workshop – Call For Papers
Read more about the article Supply Chains security brings confidence to global digital markets

Supply Chains security brings confidence to global digital markets

  • Post author:SpirosFotis
  • Post published:18 January 2022
  • Post category:Blog

CYRENE considers security certification of the SCS as a main mitigation measure and it proposes a cybersecurity scheme, a risk and conformity assessment methodologies and a tool to realize the SCS certification process

Continue ReadingSupply Chains security brings confidence to global digital markets
Read more about the article Ransomware in a supply chain environment.

Ransomware in a supply chain environment.

  • Post author:SpirosFotis
  • Post published:18 January 2022
  • Post category:Blog

In today’s world, the internet supply chain owners and participants need to make sure that not only their companies are secure from cyber-attacks, but the rest of the affiliates of the supply chain are secured as well. This need becomes more prominent with the rise in popularity of ransomware attacks...

Continue ReadingRansomware in a supply chain environment.
Read more about the article FPGA technology and Supply Chain Cyber Security

FPGA technology and Supply Chain Cyber Security

  • Post author:SpirosFotis
  • Post published:18 January 2022
  • Post category:Blog

Hardware-based security, using Field-Programmable Gate Array (FGPA) technology, may provide a viable solution for securing critical parts of Supply Chain systems against cyberattacks.

Continue ReadingFPGA technology and Supply Chain Cyber Security
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4

Privacy policy Terms & Conditions Cookie policy

Copyright 2020 - Cyrene Project

You can find out more about which cookies we are using or switch them off in settings.

cyrene
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!

Cookie Policy

More information about our Cookie Policy